|
|
Books > Science & Mathematics > Science: general issues > Forensic science
Advancing technologies, especially computer technologies, have
necessitated the creation of a comprehensive investigation and
collection methodology for digital and online evidence. The goal of
cyber forensics is to perform a structured investigation while
maintaining a documented chain of evidence to find out exactly what
happened on a computing device or on a network and who was
responsible for it. Critical Concepts, Standards, and Techniques in
Cyber Forensics is a critical research book that focuses on
providing in-depth knowledge about online forensic practices and
methods. Highlighting a range of topics such as data mining,
digital evidence, and fraud investigation, this book is ideal for
security analysts, IT specialists, software engineers, researchers,
security professionals, criminal science professionals,
policymakers, academicians, and students.
In this monograph, the authors provide an overview of Canada's NF
capability in addition to general aspects of the nuclear forensics
that is useful for both nuclear forensic practitioners and for
countries that are signatories to the Nuclear Non-proliferation
treaty in establishing their NF capability.
Mobile forensics has grown from a relatively obscure tradecraft to
a crucial part of many criminal investigations, and is now used
daily by examiners and analysts within local, state, and federal
law enforcement as well as within the military, US government
organizations, and the private ""e-Discovery"" industry.
Developments in forensic research, tools, and processes over the
past decade have been very successful and continue to change at a
rapid pace. Forensic Investigations and Risk Management in Mobile
and Wireless Communications is a collection of innovative research
on the methods and applications of analyzing mobile devices and
data for collection of information pertaining to the legal evidence
related to various security breaches and intrusion detection. While
highlighting topics including cybercrime, neural networks, and
smartphone security, this book is ideally designed for security
analysts, IT professionals, researchers, practitioners,
academicians, and students currently investigating the
up-and-coming aspects surrounding network security, computer
science, and security engineering.
Forensic anthropology has seen a recent expansion in depth and
scope as well as increased attention from the media and the legal
system. This constantly evolving science requires a comprehensive
introductory text that approaches forensic anthropology as a modern
discipline, with attention to theory as well as recent advances in
research, technology, and challenges in the field. Forensic
Anthropology: Current Methods and Practice, 2nd edition approaches
forensic anthropology using current practices and case studies
drawn from the varied experiences, backgrounds, and practices of
working forensic anthropologists. This text guides the reader
through all aspects of human remains recovery and forensic
anthropological analysis. It presents principles at a level that is
appropriate for those new to the field, while at the same time
incorporating evolutionary, biomechanical, and other theoretical
foundations for the features and phenomena encountered in forensic
anthropological casework. Attention is focused on the most recent
and scientifically valid applications commonly employed by working
forensic anthropologists. Readers will learn about innovative
techniques in the discipline, and aspiring practitioners will be
prepared by understanding the necessary background needed to work
in the field today. Instructors and students will find Forensic
Anthropology: Current Methods and Practice, 2nd edition
comprehensive, practical, and relevant to the modern discipline of
forensic anthropology.
Modern communications are now more than ever heavily dependent on
mobile networks, creating the potential for higher incidents of
sophisticated crimes, terrorism acts, and high impact cyber
security breaches. Disrupting these unlawful actions requires a
number of digital forensic principles and a comprehensive
investigation process. Mobile Network Forensics: Emerging Research
and Opportunities is an essential reference source that discusses
investigative trends in mobile devices and the internet of things,
examining malicious mobile network traffic and traffic
irregularities, as well as software-defined mobile network
backbones. Featuring research on topics such as lawful
interception, system architecture, and networking environments,
this book is ideally designed for forensic practitioners,
government officials, IT consultants, cybersecurity analysts,
researchers, professionals, academicians, and students seeking
coverage on the technical and legal aspects of conducting
investigations in the mobile networking environment.
Medical Response to Child Sexual Abuse, Second Edition is
specifically developed to equip physicians, nurses, and other
medical professionals with the necessary tools to identify cases of
child sexual abuse. This new edition is revised and updated to
reflect contemporary best practices for the pediatric approach to
childhood sexual abuse and effectively treat and examine sexually
abused patients. Professionals who work with sexually abused
children face a great challenge in not only treating the immediate
outcomes of sexual abuse but also safeguarding their patients'
long-term recovery. To meet their needs and the needs of those in
their care, Medical Response to Child Sexual Abuse, Second Edition
offers a wealth of evidence-based research and practical guidelines
to the evaluation of childhood sexual abuse.
Murders, cover-ups, infidelities, financial and political
skulduggery: Dr. John Olsson has seen it all in his decades as one
of the world's top forensic linguists specialising in authorship.
Working on cases that range from accusations of genocide to
domestic disputes gone bad to allegations of university plagiarism,
Olsson turns the same tools to the task - the power, depth and
precision of forensic linguistics. Grammatical curiosities, lexical
quirks, typographic stylings and patterns of use can all give away
even the most hard-bitten and careful of criminals. And Olsson
doesn't stop there. From the giveaway compound nouns of
heavy-handed police statements to the startling similarities
displayed in what should be individual office accounts, officials
in high places are given a run for their money too. Wordcrime is
easy to commit - and hard to escape. More Wordcrime features a
series of gripping cases involving murder, sexual assault, hate
mail, suspicious death and criminal damage. In approachable and
clear prose, Dr Olsson details how forensic linguistics helps the
law beat criminals, and how even those in power can be held to
account. This is fascinating reading for anyone interested in true
crime, in modern, cutting-edge criminology and also where the study
of language meets the law.
|
|